You can use $fline() to scan a debug window for an exploit message. For example,
- $fline(@debug,/^<- :[b][/b](\S+)!\S+@\S+ privmsg (\S+) :\x01dcc (?:send|resume|accept) +\S*"(?:\S* ){35}/i,1,2)
The last parameter, 2, was introduced in v6.1 and denotes the "wildtext" parameter is a regexp. After $fline() returned a line number, you can use $regml(1) in your script to reference to the exploiter's nickname, and $regml(2) to reference to the target (you or a channel).